CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
10.1%
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
Vendor | Product | Version | CPE |
---|---|---|---|
ray_stode | accountsservice | * | cpe:2.3:a:ray_stode:accountsservice:*:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.4 | cpe:2.3:a:ray_stode:accountsservice:0.4:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.5 | cpe:2.3:a:ray_stode:accountsservice:0.5:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.6 | cpe:2.3:a:ray_stode:accountsservice:0.6:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.6.1 | cpe:2.3:a:ray_stode:accountsservice:0.6.1:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.6.2 | cpe:2.3:a:ray_stode:accountsservice:0.6.2:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.6.3 | cpe:2.3:a:ray_stode:accountsservice:0.6.3:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.6.4 | cpe:2.3:a:ray_stode:accountsservice:0.6.4:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.6.5 | cpe:2.3:a:ray_stode:accountsservice:0.6.5:*:*:*:*:*:*:* |
ray_stode | accountsservice | 0.6.6 | cpe:2.3:a:ray_stode:accountsservice:0.6.6:*:*:*:*:*:*:* |
cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5
cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69
cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d
cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721
lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html
osvdb.org/83398
secunia.com/advisories/49695
secunia.com/advisories/49759
www.openwall.com/lists/oss-security/2012/06/28/9
www.securityfocus.com/bid/54223
www.ubuntu.com/usn/USN-1485-1
bugzilla.redhat.com/show_bug.cgi?id=832532
exchange.xforce.ibmcloud.com/vulnerabilities/76648
hermes.opensuse.org/messages/15100967